| /OK3568_Linux_fs/u-boot/lib/avb/libavb_atx/ |
| H A D | avb_atx_validate.c | 152 const AvbAtxCertificate* certificate, in verify_certificate() argument 159 if (certificate->signed_data.version != 1) { in verify_certificate() 164 sha512((const uint8_t*)&certificate->signed_data, in verify_certificate() 169 certificate->signature, in verify_certificate() 178 if (certificate->signed_data.key_version < minimum_key_version) { in verify_certificate() 182 if (0 != avb_safe_memcmp(certificate->signed_data.usage, in verify_certificate() 193 const AvbAtxCertificate* certificate, in verify_pik_certificate() argument 200 certificate, authority, minimum_version, expected_usage)) { in verify_pik_certificate() 209 const AvbAtxCertificate* certificate, in verify_psk_certificate() argument 218 certificate, authority, minimum_version, expected_usage)) { in verify_psk_certificate() [all …]
|
| /OK3568_Linux_fs/kernel/certs/ |
| H A D | Kconfig | 9 Provide the file name of a private key/certificate in PEM format, 11 the URI should identify, both the certificate and its corresponding 16 certificate as described in Documentation/admin-guide/module-signing.rst 37 system keyring. Any certificate used for module signing is implicitly 45 bool "Reserve area for inserting a certificate without recompiling" 48 If set, space for an extra certificate will be reserved in the kernel 49 image. This allows introducing a trusted certificate to the default 53 int "Number of bytes to reserve for the extra certificate" 58 certificate to be inserted. 93 be checked to see if it matches such a certificate.
|
| /OK3568_Linux_fs/kernel/security/integrity/evm/ |
| H A D | Kconfig | 59 bool "Load an X509 certificate onto the '.evm' trusted keyring" 63 Load an X509 certificate onto the '.evm' trusted keyring. 65 This option enables X509 certificate loading from the kernel 70 string "EVM X509 certificate path" 74 This option defines X509 certificate path.
|
| /OK3568_Linux_fs/buildroot/package/weston/ |
| H A D | 0087-backend-vnc-enable-TLS-support.patch | 6 Add TLS key and certificate parameters to enable encryption support. 26 + " --vnc-tls-cert=FILE\tThe file containing the certificate for TLS encryption\n" 76 + weston_log("Missing TLS certificate (--vnc-tls-cert)\n"); 120 +to ship a file containing a certificate. 123 +The file containing the certificate for doing TLS security. To have TLS security you also need 130 +You can generate a key and certificate file to use with TLS security using typical
|
| H A D | 0089-backend-vnc-Add-user-authentication.patch | 60 - weston_log("Missing TLS certificate (--vnc-tls-cert)\n"); 79 + weston_log("The VNC backend requires a key and a certificate for TLS security" 84 + weston_log("Missing TLS certificate (--vnc-tls-cert)\n");
|
| H A D | 0091-HACK-vnc-Make-pam-optional.patch | 39 weston_log("The VNC backend requires a key and a certificate for TLS security" 47 weston_log("Missing TLS certificate (--vnc-tls-cert)\n");
|
| /OK3568_Linux_fs/yocto/meta-rockchip/recipes-graphics/wayland/weston_11.0.1/ |
| H A D | 0088-backend-vnc-enable-TLS-support.patch | 6 Add TLS key and certificate parameters to enable encryption support. 26 + " --vnc-tls-cert=FILE\tThe file containing the certificate for TLS encryption\n" 76 + weston_log("Missing TLS certificate (--vnc-tls-cert)\n"); 120 +to ship a file containing a certificate. 123 +The file containing the certificate for doing TLS security. To have TLS security you also need 130 +You can generate a key and certificate file to use with TLS security using typical
|
| H A D | 0090-backend-vnc-Add-user-authentication.patch | 60 - weston_log("Missing TLS certificate (--vnc-tls-cert)\n"); 79 + weston_log("The VNC backend requires a key and a certificate for TLS security" 84 + weston_log("Missing TLS certificate (--vnc-tls-cert)\n");
|
| H A D | 0092-HACK-vnc-Make-pam-optional.patch | 39 weston_log("The VNC backend requires a key and a certificate for TLS security" 47 weston_log("Missing TLS certificate (--vnc-tls-cert)\n");
|
| /OK3568_Linux_fs/kernel/Documentation/crypto/ |
| H A D | asymmetric-keys.rst | 108 PGP-specific metadata, whereas X.509 has arbitrary certificate identifiers. 372 This allows for verification of certificate chains by adding each 373 certificate in order (starting closest to the root) to a keyring. For 376 certificate chain to be validated:: 383 # Create and restrict a keyring for the certificate chain 387 # Attempt to add each certificate in the chain, starting with the 388 # certificate closest to the root. 393 If the final end-entity certificate is successfully added to the "chain" 398 restricting the keyring after linking the root certificate:: 400 # Create a keyring for the certificate chain and add the root [all …]
|
| /OK3568_Linux_fs/yocto/meta-openembedded/meta-networking/recipes-support/strongswan/files/ |
| H A D | CVE-2022-40617.patch | 15 certificate with a CDP that points to a server that completes the 21 The logging during the certificate verification obviously changes. 83 DBG1(DBG_CFG, " using trusted ca certificate \"%Y\"", 97 + "trusted certificate \"%Y\"",
|
| /OK3568_Linux_fs/kernel/drivers/staging/greybus/ |
| H A D | authentication.c | 103 u8 *certificate, u32 *size, u8 *result) in cap_get_ims_certificate() argument 133 memcpy(certificate, response->certificate, *size); in cap_get_ims_certificate() 230 ims_cert->certificate, in cap_ioctl()
|
| H A D | greybus_authentication.h | 56 __u8 certificate[CAP_CERTIFICATE_MAX_SIZE]; member
|
| /OK3568_Linux_fs/kernel/Documentation/process/ |
| H A D | embargoed-hardware-issues.rst | 40 certificate. The list's PGP key and S/MIME certificate are available from 278 list's PGP key or with the list's S/MIME certificate. The mailing-list 280 subscriber with the subscriber's PGP key or S/MIME certificate. Details 289 the key and S/MIME certificate are conveyed to the subscribers by email 301 certificate. If a PGP key is used, it must be available from a public key 308 or the list's S/MIME certificate. The subscriber's email client can extract 309 the PGP key or the S/MIME certificate from the signature so the subscriber
|
| /OK3568_Linux_fs/kernel/crypto/asymmetric_keys/ |
| H A D | pkcs7.asn1 | 41 -- Certificates and certificate lists 46 certificate Certificate, -- X.509
|
| H A D | Kconfig | 38 tristate "X.509 certificate parser" 45 public key packet found inside the certificate.
|
| /OK3568_Linux_fs/yocto/poky/meta/recipes-support/ca-certificates/ca-certificates/ |
| H A D | 0001-Revert-mozilla-certdata2pem.py-print-a-warning-for-e.patch | 25 * Blacklist expired root certificate "DST Root CA X3" (closes: #995432) 72 - print('Trusted but expired certificate found: %s' % obj['CKA_LABEL'])
|
| /OK3568_Linux_fs/yocto/meta-openembedded/meta-oe/recipes-devtools/uw-imap/uw-imap/ |
| H A D | 0001-Support-OpenSSL-1.1.patch | 23 /* disable certificate validation? */ 65 else ret = "Unable to locate common name in certificate";
|
| /OK3568_Linux_fs/yocto/poky/meta/recipes-support/curl/curl/ |
| H A D | CVE-2022-27782-1.patch | 185 + char *CRLfile; /* CRL to check certificate revocation */ 198 BIT(verifystatus); /* set TRUE if certificate status must be checked */ 202 long certverifyresult; /* result from the certificate verification */ 203 - char *CRLfile; /* CRL to check certificate revocation */ 206 char *cert_type; /* format for certificate (default: PEM)*/ 216 BIT(certinfo); /* gather lots of certificate info */ 301 failf(data, "server certificate verification failed. CAfile: %s "
|
| /OK3568_Linux_fs/yocto/meta-openembedded/meta-networking/recipes-connectivity/freeradius/files/ |
| H A D | 0001-raddb-certs-Makefile-fix-the-existed-certificate-err.patch | 4 Subject: [PATCH] raddb/certs/Makefile: fix the existed certificate error 13 ERROR:There is already a certificate for /C=FR/ST=Radius/O=Example Inc./CN=user@example.org/emailAd…
|
| /OK3568_Linux_fs/yocto/poky/meta/recipes-support/ca-certificates/ |
| H A D | ca-certificates_20211016.bb | 53 echo "# Lines starting with ! will remove certificate on next update" 75 # we just run update-ca-certificate from do_install() for nativesdk.
|
| /OK3568_Linux_fs/buildroot/package/ca-certificates/ |
| H A D | Config.in | 8 It includes, among others, certificate authorities used by the
|
| /OK3568_Linux_fs/buildroot/package/libaacs/ |
| H A D | Config.in | 9 NB: this project doesn't offer any key or certificate that
|
| /OK3568_Linux_fs/buildroot/package/luaossl/ |
| H A D | Config.in | 10 It includes support for certificate and key management,
|
| /OK3568_Linux_fs/buildroot/package/libbdplus/ |
| H A D | Config.in | 13 certificate that could be used to decode encrypted copyrighted
|